A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html below:

IAM and AWS STS quotas

IAM and AWS STS quotas

AWS Identity and Access Management (IAM) and AWS Security Token Service (STS) have quotas that limit the size of objects. This affects how you name an object, the number of objects you can create, and the number of characters you can use when you pass an object.

IAM name requirements

IAM names have the following requirements and restrictions:

For a list of Basic Latin (ASCII) characters, go to the Library of Congress Basic Latin (ASCII) Code Table.

IAM object quotas

Quotas, also referred to as limits in AWS, are the maximum values for the resources, actions, and items in your AWS account. Use Service Quotas to manage your IAM quotas.

For the list of IAM service endpoints and service quotas, see AWS Identity and Access Management endpoints and quotas in the AWS General Reference.

To request a quota increase

  1. Follow the sign-in procedure appropriate to your user type as described in the topic How to sign in to AWS in the AWS Sign-In User Guide to sign in to the AWS Management Console.

  2. Open the Service Quotas console.

  3. In the navigation pane, choose AWS services.

  4. On the navigation bar, choose the US East (N. Virginia) Region. Then search for IAM.

  5. Choose AWS Identity and Access Management (IAM), choose a quota, and follow the directions to request a quota increase.

For more information, see Requesting a Quota Increase in the Service Quotas User Guide.

To see an example of how to request an IAM quota increase using the Service Quotas console, watch the following video.

You can request an increase to default quotas for adjustable IAM quotas. Requests up to the maximum quota are automatically approved and completed within a few minutes.

The following table lists the resources for which quota increases area can be automatically approved.

Resource Default quota Maximum quota Customer managed policies per account 1500 5000 Groups per account 300 500 Instance profiles per account 1000 5000 Managed policies per role 10 20 Managed policies per user 10 20 Managed policies per group 10 10 Role trust policy length 2048 characters 4096 characters Roles per account 1000 5000 Server certificates per account 20 1000 IAM Access Analyzer quotas

For the list of IAM Access Analyzer service endpoints and service quotas, see IAM Access Analyzer endpoints and quotas in the AWS General Reference.

IAM Roles Anywhere quotas

For the list of IAM Roles Anywhere service endpoints and service quotas, see AWS Identity and Access Management Roles Anywhere endpoints and quotas in the AWS General Reference.

STS request quotas

The AWS Security Token Service (AWS STS) enforces the following request quotas.

For AWS STS requests made using AWS credentials, the default request quota is 600 requests per second, per account, per Region. The following AWS STS operations share this quota:

Note

Requests to AWS STS by AWS service principals, such as those used to assume roles for use with an AWS service, do not consume STS request per second quota in your accounts.

For example, if an AWS account makes 100 GetCallerIdentity requests per second and 100 AssumeRole calls per second in the same region, that account is consuming 200 of its available 600 STS requests per second for that region.

For cross-account AssumeRole requests, only the account making the AssumeRole request impacts the STS quota. The target account does not have any of it’s quota consumed.

To request an increase to STS request quotas, please open a ticket with AWS support.

Note

With the upcoming changes to the AWS STS global endpoint (https://sts.amazonaws.com), requests to the global endpoint will not share a requests per second (RPS) quota with AWS STS Regional endpoints in Regions that are enabled by default. When a request to the AWS STS global endpoint originates from a single Region, it will count against the global endpoint's RPS quota. However, when requests come from multiple Regions, each additional Region will receive its own independent RPS quota. For more information about the AWS STS global endpoint changes, see AWS STS global endpoint changes.

IAM and STS character limits

The following are the maximum character counts and size limits for IAM and AWS STS. You can't request an increase for the following limits.

Description Limit Alias for an AWS account ID 3–63 characters For inline policies You can add as many inline policies as you want to an IAM user, role, or group. But the total aggregate policy size (the sum size of all inline policies) per entity can't exceed the following limits:

Note

IAM doesn't count white space when calculating the size of a policy against these limits.

For managed policies

Note

IAM doesn't count white space when calculating the size of a policy against this limit.

Group name 128 characters Instance profile name 128 characters Password for a login profile 1–128 characters Path 512 characters Policy name 128 characters Role name 64 characters

Important

If you intend to use a role with the Switch Role feature in the AWS Management Console, then the combined Path and RoleName can't exceed 64 characters.

Role session duration

12 hours

When you assume a role from the AWS CLI or API, you can use the duration-seconds CLI parameter or the DurationSeconds API parameter to request a longer role session. You can specify a value from 900 seconds (15 minutes) up to the maximum session duration setting for the role, which can range 1–12 hours. If you don't specify a value for the DurationSeconds parameter, your security credentials are valid for one hour. IAM users who switch roles in the console are granted the maximum session duration, or the remaining time in the user's session, whichever is less. The maximum session duration setting doesn't limit sessions assumed by AWS services. To learn how to view the maximum value for your role, see Update the maximum session duration for a role.

Role session name 64 characters Role session policies Role session tags SAML authentication response base64 encoded 100,000 characters

This character limit applies to assume-role-with-saml CLI or AssumeRoleWithSAML API operation.

Tag key 128 characters

This character limit applies to tags on IAM resources and session tags.

Tag value 256 characters

This character limit applies to tags on IAM resources and session tags.

Tag values can be empty which means tag values can have a length of 0 characters.

Unique IDs created by IAM

128 characters. For example:

Note

This isn't intended to be an exhaustive list, nor is it a guarantee that IDs of a certain type begin only with the specified letter combination.

User name 64 characters

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4